SECURITY
Security Policies
Protecting our data, systems, and workplace through comprehensive security measures.
Information Security
Protecting sensitive company and client information from unauthorized access or disclosure.
- All passwords must be strong and changed every 90 days
- Never share passwords or access credentials with others
- Use multi-factor authentication (MFA) where available
- Encrypt sensitive data both in transit and at rest
- Report any suspected security breaches immediately
- Do not access systems or data outside your authorized scope
- Log out of systems when not in use
- Follow data classification and handling procedures
Physical Security
Maintaining physical security of the workplace and company assets.
- Wear your ID badge at all times while on company premises
- Do not allow unauthorized persons into restricted areas
- Report lost or stolen access cards immediately
- Lock workstations and secure documents when away from desk
- Do not leave sensitive documents unattended
- Follow visitor management procedures
- Secure company equipment and devices
- Report any suspicious activity or persons to security
Data Protection
Safeguarding personal and business data in compliance with regulations.
- Handle personal data in accordance with privacy regulations
- Do not store sensitive data on personal devices without approval
- Use approved cloud storage and backup solutions
- Regularly backup important work data
- Do not send sensitive information via unsecured channels
- Follow data retention and disposal policies
- Report any data loss or unauthorized access immediately
- Obtain consent before sharing personal information
Network & System Security
Protecting our network infrastructure and systems from cyber threats.
- Connect only approved devices to company networks
- Keep all software and systems updated with latest security patches
- Do not install unauthorized software or applications
- Use company-approved antivirus and security tools
- Do not connect to public Wi-Fi when handling sensitive data
- Follow secure remote access procedures
- Report any suspicious network activity or malware
- Regular security awareness training is mandatory
Email & Communication Security
Secure practices for email and other communication channels.
- Be cautious of phishing emails and suspicious links
- Verify sender identity before opening attachments
- Do not share sensitive information via email unless encrypted
- Use company email for business purposes only
- Report suspicious emails to IT security immediately
- Do not click on links from unknown or untrusted sources
- Use secure communication channels for sensitive discussions
- Follow email retention and archiving policies
Incident Response
Procedures for reporting and responding to security incidents.
- Report security incidents immediately to IT security or management
- Do not attempt to investigate or fix security issues yourself
- Preserve evidence if possible (screenshots, logs, etc.)
- Follow incident response procedures as directed
- Cooperate with security investigations
- Document all security incidents for review
- Learn from incidents to prevent future occurrences
- Maintain confidentiality during incident investigations
Reporting Bugs & Security Issues
How to report security vulnerabilities, bugs, and security-related issues responsibly.
- Email all bug reports and security-related issues to: security@arvyo.com
- Include detailed information about the issue (steps to reproduce, affected systems, etc.)
- For security vulnerabilities, do not publicly disclose until we have addressed the issue
- We appreciate responsible disclosure and will acknowledge valid reports
- Include your contact information if you would like to be credited or updated on the resolution
- Report issues promptly to help us maintain the security of our systems and services
Report security concerns, bugs, or vulnerabilities
security@arvyo.com